cyber intelligence europe · monday 28th september 2015 09.00 – 16.00 full day workshop you are...

8
For more information visit – www.intelligence-sec.com Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706 CYBER INTELLIGENCE EUROPE 28 th – 30 th September 2015 Bucharest, Romania ORGANISED BY: Speakers Include: Bebe-Viorel Ionica, Secretary of State, Ministry of Information Communication and Technology, Romania Lieutenant General Alexandru Grumaz, President, The Security Studies and Analysis Centre (CASS), Romania Brigadier General Helmut Habermayer, Chief Information Officer, Ministry of Defence, Austria Radu Magdin, Honorary Advisor to the Prime Minister, Prime Minister’s Office, Romania Tural Mammadov, Head, Government CERT, Special Communication and Information Security State Agency, Special State Protection Service, Azerbaijan Republic Steve Purser, Head, Core Operations Department, European Union Agency for Network and Information Security (ENISA) Nikolay Koval, Acting Head, Computer Emergency Response Team of Ukraine CERT-UA State Service of Special Communication and Information Protection, State Center of Information and Telecommunication Systems , Ukraine Major Isidoros Monogioudis, Cyber Defence Analyst, Cyber Defence Command, Ministry of Defence, Greece Hans Oude Alink, Senior Advisor, Crisis Management, National Cyber Security Centre (NCSC), Netherlands Inspector Ljuban Petrovic, Service for Combating Organized Crime, Cyber Crime Department, Ministry of Interior, Serbia Lieutenant Blerim Krasniqi, Manager, IT Forensic Department, Kosovo Agency, Ministry of Internal Affairs, Kosovo Daniel Peder Bagge, Head of Unit, National Cyber Security Center, National Security Agency, Czech Republic Eugen Valeriu Popa, Vice President, The Security Studies and Analysis Centre (CASS), Romania Reasons to Attend Review the latest cybercrimes in the region Discuss the importance of sharing information between governments and the private sector Analyse the latest malware, DDoS and BYOD protection Develop an understanding of the regions Cyber Security Strategies Identify the major threats being faced to government institutions Network with leading government officials from Romania and the regions governments Visit the vibrant exhibition with leading companies showcasing their latest cyber defence products and technologies Sponsors & Exhibitors Associated Workshop 28 th September 2015 You are Under Attack – Risk Assessment – Cyber Defence OR Defending the Business 09.00 – 16.00 Host: Air Commodore (Ret) Bruce Wynn

Upload: others

Post on 26-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CYBER INTELLIGENCE EUROPE · Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

CYBER INTELLIGENCE EUROPE 28th – 30th September 2015 Bucharest, Romania

ORGANISED BY:

Speakers Include: • Bebe-Viorel Ionica, Secretary of State, Ministry of Information Communication and Technology, Romania • Lieutenant General Alexandru Grumaz, President, The Security Studies and Analysis Centre (CASS), Romania • Brigadier General Helmut Habermayer, Chief Information Officer, Ministry of Defence, Austria • Radu Magdin, Honorary Advisor to the Prime Minister, Prime Minister’s Office, Romania • Tural Mammadov, Head, Government CERT, Special Communication and Information Security State Agency, Special State

Protection Service, Azerbaijan Republic • Steve Purser, Head, Core Operations Department, European Union Agency for Network and Information Security (ENISA) • Nikolay Koval, Acting Head, Computer Emergency Response Team of Ukraine CERT-UA State Service of Special Communication

and Information Protection, State Center of Information and Telecommunication Systems , Ukraine • Major Isidoros Monogioudis, Cyber Defence Analyst, Cyber Defence Command, Ministry of Defence, Greece • Hans Oude Alink, Senior Advisor, Crisis Management, National Cyber Security Centre (NCSC), Netherlands • Inspector Ljuban Petrovic, Service for Combating Organized Crime, Cyber Crime Department, Ministry of Interior, Serbia • Lieutenant Blerim Krasniqi, Manager, IT Forensic Department, Kosovo Agency, Ministry of Internal Affairs, Kosovo • Daniel Peder Bagge, Head of Unit, National Cyber Security Center, National Security Agency, Czech Republic • Eugen Valeriu Popa, Vice President, The Security Studies and Analysis Centre (CASS), Romania

Reasons to Attend • Review the latest cybercrimes in the region • Discuss the importance of sharing information between

governments and the private sector • Analyse the latest malware, DDoS and BYOD protection • Develop an understanding of the regions Cyber Security

Strategies • Identify the major threats being faced to government

institutions • Network with leading government officials from Romania and

the regions governments • Visit the vibrant exhibition with leading companies showcasing

their latest cyber defence products and technologies

Sponsors & Exhibitors

Associated Workshop 28th September 2015 You are Under Attack – Risk Assessment – Cyber Defence OR Defending the Business 09.00 – 16.00 Host: Air Commodore (Ret) Bruce Wynn

Page 2: CYBER INTELLIGENCE EUROPE · Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT SCHEDULE

Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED BY: Air Commodore (Ret) Bruce Wynn OBE FBCS CITP

Tuesday 29th September 2015 08.30 – 17.00 DAY ONE OF CONFERENCE 08.30 – 17.00 DAY ONE OF EXHIBITION TOPICS DISCUSSED: HOST NATION OVERVIEW ON CYBER SECURITY AND CYBERCRIMES REGIONAL CYBERCRIMES

Wednesday 30th September 2015 08.30 – 17.00 DAY TWO OF CONFERENCE 08.30 – 17.00 DAY TWO OF EXHIBITION TOPICS DISCUSSED: INTERNATIONAL COOPERATION FOR COMBATING CYBERCRIMES AND ORGANISED CRIMES CRISIS MANAGEMENT AND READINESS CYBER DEFENCE STRATEGIES

Page 3: CYBER INTELLIGENCE EUROPE · Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT WORKSHOP

YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS

OVERVIEW The workshop will stimulate and expand your thinking on how to address the Cyber issues confronting you. It will start by reviewing the threat landscape across the Cyber Domain, based on the REAL risks to you and to your business, derived from pragmatic assessment of the cyber threats, vulnerabilities and capabilities (both defensive and offensive) It will then use the UK MOD's Cyber Defence Taxonomy (which was authored by the presenter under specific tasking from the UK MOD), in conjunction with the UK Cyber Defence Strategy, to help explore the competing pressures on CIOs, CISOs, CTOs, COOs and CEOs across their respective areas of responsibilities, and present guidance on how to make more appropriate balance of investment decisions in 'Cyber‘ In defending in the Cyber domain, it will address what should be the balance between: • Technology versus Tactics? • People versus Procedures? • Defending versus Detecting? It will analyse the trend towards Intelligence-based Cyber Defence, and some of the consequent legal implications Business is about managing risk - cyber is no different • Risk = (Threat x Vulnerability x Impact x Probability)/Mitigation • How should this affect the way in which we protect ourselves and our

systems? • Advanced Persistent Threat or Conventional Malware Attacks - what

should we REALLY be worried about? • Where do ‘mobile threats’ and ‘Bring-Your-Own’ devices play in the wider

risk equations And how do you address the solution?

BENEFITS OF ATTENDING On completion of this Cyber workshop you will: • Have a wider appreciation of the threat landscape in the Cyber Domain • Have a wider understanding of the complex linkages between technology, people, process, tools, business benefit and balance of investment

decisions • Understand how the making significant investment in stopping intruders isn't necessarily the best approach • Be able to better articulate the relationships between business continuity and cyber defence, and balance the demands of each • Be able to better position your responsibilities within the wider Cyber arena • Have had an introduction to some tools to help you in your decision-making • Have a solid foundation to extract most benefit from the rest of the Conference • Be able to make better-informed decisions in your area of Cyber!

WORKSHOP HOST Air Commodore Bruce Wynn OBE FBCS CITP RAF (ret) Bruce Wynn spent 34 years in the UK's Royal Air Force ‘Cyber’ arena, across the Operations, Technical and Intelligence business, including being the Service’ s Chief Information Technology Officer (CTO for ‘Cyber’), Chief Information Security Officer, Chief Security Accreditation Officer, and Deputy Chief Information Officer. He is now an independent consultant. Since his retirement from active duty in 2004, he has developed a portfolio of engagements in the informatics and cyber domains, including special advisor to the CIO/CTO of one of the UK’s intelligence agencies, support to large companies such as IBM, Gartner, Lockheed Martin, Raytheon, EADS, Dell/Secureworks, Global Crossing and L3 in the UK, and IBM, Guidance Software, Endgame Systems, Integrity Global Security, VIR-SEC, @Sentinel and ResilientCom/Tier-V Corp in the USA. His portfolio also includes active participation as CTO in small niche companies at the heart of the high-security aspects of government, and as a Visiting Scientist with the US Navy's Office Of Naval Research Global, covering Cyber! He in engaged as a Serious Cyber Incident Response Coordinator for a Fortune 50 cyber security services company for their interaction with affected CIOs, CEOs and COOs He has spoken widely on Cyber, as well as facilitated discussions and workshops, at conferences and seminars in the US, and UK as well as across Europe and in South Africa, for the defence, intelligence and national security communities, and has been a regular at conferences such as BlackHat, Defcon, Hack-in-the Box, BSides and 44Con since 2004 He is a Senior Fellow of the British Computer Society, a Chartered Information Technology Professional, and has been appointed by Her Majesty the Queen as an Officer of the Most Excellent Order of the British Empire

Page 4: CYBER INTELLIGENCE EUROPE · Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

PROGRAMME DAY ONE 08.30 Registration & Coffee 09.00 CHAIRMAN’S OPENING REMARKS Eugen Valeriu Popa, Vice- President, The Security Studies and Analysis Centre (CASS), Romania HOST NATION OVERVIEW - CYBER SECURITY, INTELLIGENCE AND CRIMES 09.10 OPENING ADDRESS Lieutenant General Alexandru Grumaz, President, The Security Studies and Analysis Centre (CASS), Romania 09.40 KEYNOTE ADDRESS: ROMANIAN CYBER SECURITY ROADMAP • Review of Romanian Cyber Security • Current government strategies to secure critical infrastructures • Government cooperation • Future steps Bebe-Viorel Ionica, Secretary of State, Ministry of Information Communication and Technology, Romania 10.10 Q-EAST SOFTWARE PRESENTATION Senior Representative, Q-East Software 10.40 Networking Coffee Break 11.10 MILITARY EDUCATION OF CYBER DEFENCE • What Education is provided to the Romanian Armed Forces on

combating Cybercrimes? • Overview of the Military Computer Network • Response to a cyber-attack General (Ret) Teodor Frunzeti, Councillor, Department of National Security, Romania 11.40 ROMANIAN GOVERNMENT COOPERATION IN COMBATING CYBER CRIMES • Overview of the current cyber security capabilities of the Romanian

Government • What agencies are working together to strengthen cyber security

capabilities • Importance of sharing information between departments and agencies Eugen Valeriu Popa, Vice- President, The Security Studies and Analysis Centre (CASS), Romania 12.10 CYBER SECURITY LEGISLATION – EU LEVEL • Overview of legislation in Romania • What the Romanian Government is implementing to secure

infrastructures • Cooperation in the region • How to monitor the internet and combat the threats Radu Magdin, Honorary Advisor to the Prime Minister, Prime Minister’s Office, Romania 12.40 CERTSIGN PRESENTATION

Nicolae Ghibu, CEO, CertSIGN

13.10 Networking Lunch Break REGIONAL CYBERCRIMES 14.10 TRACKING THE CYBER CRIMINALS: HUNGARIAN CASE STUDIES • Overview of the CDMA • Developments made in Hungary regarding cyber security capabilities • Recent cybercrimes carried out in Hungary • Tracking the individual criminals Dr. Ferenc Suba, Senior Advisor, National Cybersecurity Coordination Council, Prime Minister’s Office, Hungary 14.40 PRODAFT PRESENTATION Can Yildizli, CEO, PRODAFT 15.10 COMBATING CYBERCRIMES IN SERBIA • Tracking cyber criminals in Serbia and overseas • Current state of Serbian Cyber Security • Recent acts of cybercrimes • Bringing the individual/organisation to justice Inspector Ljuban Petrovic, Service for Combating Organized Crime, Cyber Crime Department, Ministry of Interior, Serbia 15.40 Networking Coffee Break 16.10 KOSOVO CYBER FORENSICS • Overview of Cyber Security in Kosovo • What threats have been faced to the Kosovo Government Computer

Systems • Cyber Forensics used at combating cybercrimes • Where next Lieutenant Blerim Krasniqi, Manager, IT Forensic Department, Kosovo Agency, Ministry of Internal Affairs, Kosovo Avdush Jashari, Chief of the Laboratory for Computer Examination, IT Forensic Department, Kosovo Agency, Ministry of Internal Affairs, Kosovo 16.40 RECENT CYBER ATTACKS ON GEORGIA: CASE STUDIES • Cyber lessons learned • Cyber Defense policy – Development of cybercrime divisions Diana Tsutskiridze, Research Associate, Georgian Security Analysis Center, GFSIS 17.10 A VIEW OF THE CYBER WORLD FROM A “BAD GUYS” PERSPECTIVE • Understanding some of the bad guys business models • Examining their motivations and opportunities • Offering insights that might help shape your thinking in defending your

business Air Commodore (Ret) Bruce Wynn OBE, FBCS CITP RAF, Independent Consultant, United Kingdom 17.40 CHAIRMAN’S CLOSING REMARKS Eugen Valeriu Popa, Vice- President, The Security Studies and Analysis Centre (CASS), Romania

Page 5: CYBER INTELLIGENCE EUROPE · Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

PROGRAMME DAY TWO 08.30 Registration & Coffee 09.00 CHAIRMAN’S OPENING REMARKS Eugen Valeriu Popa, Vice- President, The Security Studies and Analysis Centre (CASS), Romania INTERNATIONAL COOPERATION FOR COMBATING CYBERCRIMES AND ORGANISED CRIMES 09.10 NATO FOCUS IN EASTERN EUROPE • Overview of NATO’s plan in implementing strong cyber capabilities • Cooperation with the Romanian Government • NATO Cyber Capabilities • Future focus Christian-Marc Liflander, Policy Advisor, Cyber Defense Section, Emerging Security Challenges Division, NATO 09.40 RECENT CYBERCRIMES ACROSS EUROPE • Overview of Cyber Intelligence techniques used by EC3 • What are we monitoring • Where are the threats coming from • Future developments Invited: Marnix Auman, Head of Cyber Intelligence - European Cybercrime Centre (EC3), EUROPOL 10.10 COMBATING ORGANISED CYBERCRIMES IN THE REGION • Current practices used by OSCE to secure networks • Cooperating with governments • 2015/16 mission Ben Hiller, Cyber Security Officer, Organisation for Security and Co-operation in Europe (OSCE) 10.40 Networking Coffee Break 11.10 PROTECTING EUROPEAN NETWORK INFRASTRUCTURE • Current ENISA missions • Cooperation with Eastern European governments • Internet crimes Steve Purser, Head of Capability Department, European Union Agency for Network and Information Security (ENISA) CRISIS MANAGEMENT AND READINESS 11.40 CYBER CRISIS MANGEMENT – NETHERLANDS CASE STUDY • Overview of the NCSC • What responses are implemented when a cyber-breach is detected • Crisis Management case studies from recent breaches Hans Oude Alink, Senior Advisor, Crisis Management, National Cyber Security Centre (NCSC), Netherlands

12.10 SMALL BUT SMART - THE AUSTRIAN MODEL OF CYBER SECURITY • Overview of Austrian Cyber Security • Crisis Response strategy • How the Austrian Cyber Security Model has developed • Future steps Brigadier General Helmut Habermayer, Deputy Head General Directorate Planning and Chief Information Officer, Ministry of Defence and Sports, Austria 12.40 Networking Lunch Break

CYBER DEFENCE STRATEGIES 13.40 ALBANIAN CYBER SECURITY ISSUES • Overview of Cyber Security in Albania • Develops made on our government computer network • Cooperation with neighbouring Balkans nations • What is needed Elton Kerluku, Head of Cyber issues, Albanian State Police 14.10 ARMENIAN CYBER DEFENCE STRATEGIES • Overview of Armenian Cyber Defence Capabilities • Recent cybercrime cases • Where are our vulnerabilities and strengths are in our compute systems Arman Grigoryan, Head of National Cyber Security Center, Institute for National Strategic Studies (INSS), Ministry of Defence, Armenia 14.40 CZECH NATIONAL CYBER SECURITY STRATEGY • Development of a strong Czech Cyber Security Capability • Recent case studies of cyber-attacks in the Czech Republic • Protecting critical infrastructure Daniel Peder Bagge, Head of Unit, National Cyber Security Center, National Security Agency, Czech Republic 15.10 Networking Coffee Break 15.40 UKRAINIAN CYBER SECURITY OVERVIEW • Role of the CERT-UA • Current threats being faced to Ukraine government systems • International support required • Future steps Nikolay Koval, Acting Head, Computer Emergency Response Team of Ukraine CERT-UA State Service of Special Communication and Information Protection, State Center of Information and Telecommunication Systems , Ukraine 16.10 CYBER DEFENCE SYSTEMS IN AZERBAIJAN • Overview of Azerbaijan Cyber Security • Recent threats to critical infrastructure • Internet security • Future developments Tural Mammadov, Director, Azerbaijan Computer Emergency Response Team (CERT-GOV-Az) 16.40 GREEK CYBER DEFENCE • Overview of National Military Cyber Defence Strategy • International Cyber Defence Exercises: Lessons Learned • Participating in EU funded research programmes: Collaboration with

private and academic sector • Training used by Greek Military to strengthen cyber security Major Isidoros Monogioudis, Cyber Defence Analyst, Ministry of Defence, Greece 17.10 CHAIRMAN’S CLOSING REMARKS Eugen Valeriu Popa, Vice- President, The Security Studies and Analysis Centre (CASS), Romania

Page 6: CYBER INTELLIGENCE EUROPE · Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT SPONSORS & EXHIBITORS

Personalised Branding Sponsors

certSIGN is a Romanian company that specializes in the development of information security software and the provision of cyber security services. It is the only Romanian company that runs a private CERT. certSIGN’s innovative solutions help both organizations that need to protect their assets against possible threats and customers who wish to improve their information systems, while also improving and optimizing their business operations.

Exhibitors

Logika IT Solutions is a provider of information technology for enterprise and government organizations, specialized in cyber security solutions, as well in finding and introducing new technologies with positive impact on our client’s business. We demonstrated our ability to successfully design, install and support state-of-the-art solutions by implementing projects that aimed complex networks, larger than 20.000 endpoints.

Demonstration Sponsor

Q-East Software has built 14 years of excellence in delivering top IT&C services, as the only authorized Dell Software distributor for Romania, Moldavia, Bulgaria and the Adriatic Region. With vision and expertise, Q-East Software manages to provide state of the art solutions for systems management, database security and applications management for the use of both private and public organizations. Given the ever-changing and increasingly risky information environment, the company distinguishes itself by the efficient implementation of management and disaster recovery systems for IT infrastructures. It also provides intelligent security solutions for critical platforms and for user identity and access management. In the field of cybersecurity and security standards compliance, Q-East Software implements security and event-log management solutions, reaching over 2.000 optimized systems implementations, for the best use of 100,000 beneficiaries. Through its solid commitment to customer service, Q-East Software has built a long-term business partnership with over 450 customers, from telecommunications, utilities, media, financial, oil & gas, energy, automotive, to the public administration, governmental structures and defense agencies. Based on its flexible and proactive approach, Q-East Software delivers training, implementation services and ongoing product/client support, both directly and through a network of strategic partner/resellers for local, national and multi-national customers across all industry segments.

PRODAFT, (Proactive Defense Against Future Threats), is a pioneer cyber security and cyber intelligence company providing innovative products and proactive solutions to commercial customers and government institutions as well as setting global standards with its extensive knowledge. By means of special sensor projects which monitor “the underground” continuously, PRODAFT enables organizations to acquire “real-time” global dynamics of cyber-criminal activity.

Page 7: CYBER INTELLIGENCE EUROPE · Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT PARTNERS

Official Event Partner

The Security Studies and Analysis Centre (CASS) Mission Statement: • Supplying resources and information to national and international

security professionals, to government structures and individual users; • Organizing events regarding national and international security; • Interdisciplinary research conducted by SASC members in the field of

national and international security; • Promotion of Romanian cultural values in the field of national and

international security; • Developing programs on its own and in partnership with public

authorities or other NGOs from Romania or abroad; • Taking part in national and international competitions for developing

scientific research projects, financed by the local government, EU, NATO or other interested parties;

• Consultancy in the field of national and international security.

Media Partners

Page 8: CYBER INTELLIGENCE EUROPE · Monday 28th September 2015 09.00 – 16.00 FULL DAY WORKSHOP YOU ARE UNDER ATTACK – RISK ASSESSMENT – CYBER DEFENCE OR DEFENDING THE BUSINESS HOSTED

For more information visit www.intelligence-sec.com

DELEGATE DETAILS: Please complete your details below.

Title/Rank:

First Name:

Surname:

Job Title:

Company:

Tel:

Fax:

Email:

Address:

Signature:

Date:

VENUE & ACCOMMODATION

Hotel Name: Radisson Blu Hotel, Bucharest, Romania

Please tick here if you would us to contact you to book your

accommodation ☐ TERMS AND CONDITIONS

Payments - All bookings made prior to the conference must be paid in full to guarantee registration. Once payment has been received, an email confirmation and a receipted invoice will be sent. If payment is not made at the time of booking, registration will be provisional. Bookings received less than two weeks before the conference date can only be paid by credit card. Early Bird Rate - In order to qualify for any 'early bird' rates, booking must be received before the deadline date listed in the conference marketing material. Substitutions & Cancellations - Delegates may nominate an alternative person from their organisation to attend up to 24 hours prior to the start of the event, at no extra charge. Should substitution not be possible, cancellation charges apply as follows: 8 weeks or more prior to start of event: 10% of the delegate fee , 4 to 8 weeks prior to start of event: 50% of the delegate fee , 4 weeks or less prior to start of event: 100% of the delegate fee. All substitutions and cancellations must be received in writing Access Requirements - Delegates should advise of any special access requirements at the time of registration. Registration Information - Registration information will be sent to registered delegates by email at least seven days prior to the event. Any delegate not receiving the registration information should contact us by email to [email protected] Alterations to Programme - Cancellation/Postponement of Event - Intelligence-Sec reserves the right to make alterations to the conference programme, venue and timings. In the unlikely event of the programme being cancelled by Intelligence-Sec, a full refund will be made. Liability will be limited to the amount of the fee paid by the delegate. In the event of it being found necessary, for whatever reason, that the conference is being postponed or the dates being changed, the organisers shall not be liable for any expenditure, damage or loss incurred by the delegate. If by re-arrangement or postponement the event can take place, the booking between the delegate and the organisers shall remain in force and will be subject to the cancellation schedule in paragraph 3 Speakers - Views expressed by speakers are their own. Intelligence-Sec cannot accept liability for advice given, or views expressed, by any speaker at the conference or in any material provided to delegates. Photography & Filming - For promotional purposes, there may be a professional photographer and video production taking place during the conference. Delegates who do not wish to be filmed or recorded should advise the organisers by email to [email protected] prior to the event. Data Protection - By submitting registration details, delegates agree to allow Intelligence-Sec and companies associated with the conference to contact them regarding their services. Delegates who do not wish to receive such communications please email [email protected]. The contact details of registered delegates will be placed on the attendee list which will be passed to sponsoring companies and to all attendees for them to see who is at the conference for the purpose of networking and meetings. Delegates who do not wish to be included on this list should advise at the time of booking. Websites & Links - The conference and associated Intelligence-Sec websites may link to other websites and networking tools provided for the convenience of the users. The contents of these websites are maintained by their owners, for which Intelligence-Sec takes no responsibility. Neither can responsibility be taken for contents of any website linking to this website. Insurance - It is the responsibility of the delegate to arrange appropriate insurance cover in connection with their attendance at the conference. Intelligence-Sec cannot be held liable for any loss, liability or damage to personal property. If you have any questions about these Terms & Conditions, please contact – [email protected]

PAYMENT DETAILS:

Please complete your details below.

☐Wire Transfer: Barclays, 16 High Street North, Dunstable, Bedfordshire, LU6 1JZ, United Kingdom Sort Code: 20 55 33 Account Number: 53554104

☐Payment by Credit Card:

All card payments need to be made via our website

http://www.intelligence-sec.com/login/

Or we will send you a PayPal payment request for you to

make payment.

ADDITIONAL NOTES

BOOKING FORM

Cyber Intelligence Europe 2015

28th – 30th September 2015, Bucharest, Romania

Please Tick

Military/Government, Public Sector Rate

Early Bird Price Book Before 31/07/2015

Standard Price

Two Day Conference &

Exhibition 250 EUR 300 EUR

Workshop 100 EUR 150 EUR

All of the above 350 EUR 450 EUR

Please Tick

Commercial Organisations Early Bird Price Book Before 31/07/2015

Standard Price

Two Day Conference &

Exhibition 500 EUR 600 EUR

Workshop 200 EUR 300 EUR

All of the above 700 EUR 900 EUR